(Apologies for reviving a month-old thread, but the example seems relevant and worth documenting "don't do this" on.)

On 21/03/2013 22:25, Tim Draegen wrote:
On Mar 20, 2013, at 11:49 PM, John Levine <[email protected]> wrote:
For example, I now have a very
good idea how many NANOG subscribers get their mail at Gmail, Hotmail,
and Yahoo.
Before we (as a discussion list) jump to conclusions, can we be a bit more 
rigorous in fleshing out what people are concerned about in terms of privacy?  
It'll make the draft better.

For example, "privacy disaster waiting to blow up" sounds like someone needs to 
jump on the grenade before DMARC explodes and kills everyone's privacy.  Since this 
appears be about DMARC allowing people to count how many list subscribers live at each 
DMARC-enabled provider, what are the privacy implications?  Hyperbole aside, is there 
anything there?

I'll take a stab at fleshing this out:
        - I no longer have to talk to the list admin and ask for these 
statistics.
        - I don't have to pay anyone for these numbers.
        - I can determine how many list lurkers are Out There.

That wasn't very satisfying.  Where is the disaster?

Here's a worse example from a large webmail provider (who has since stopped doing this!) that resulted from a post I made to a mailing list in December (this is the second section of the ARF message):

Content-Type: message/feedback-report

Feedback-Type: auth-failure
User-Agent: XMR/2.2
Version: 1.0
Original-Mail-From: <[email protected]>
Original-Rcpt-To: [email protected]
Arrival-Date: Mon, 17 Dec 2012 01:43:02 -0800
Message-ID: <[email protected]>
Authentication-Results: example.com; spf=temperror (sender IP is 138.25.6.16; 
identity alignment result is fail and alignment mode is relaxed) 
[email protected]; dkim=fail (identity alignment result 
is pass and alignment mode is relaxed) header.d=raz.cx; x-hmca=none
Source-IP: 138.25.6.16
Auth-Failure: signature
Reported-Domain: raz.cx
DKIM-Domain: raz.cx
DKIM-Identity: @raz.cx
DKIM-Selector: 20120325

This is a copy+paste from the message source, except that I replaced the subscriber's _*real*_ addresses with [email protected] (and the organisation's domain with example.com in Authentication-Results). This specific issue is called out in RFC5965 8.5 but was missed by this organisation.

Given that DMARC failure reports are usually sent to someone other than the netblock owner from which the message was received by the reporter, this concern might be worth banging on a bit harder in specification and/or implementation docs. (The "you probably don't want to send failure reports to people you don't have an NDA with" argument is also relevant, of course.)

- Roland



--
  Roland Turner | Director, Labs
  TrustSphere Pte Ltd | 3 Phillip Street #13-03, Singapore 048693
  Mobile: +65 96700022 | Skype: roland.turner
  [email protected] | http://www.trustsphere.com/

_______________________________________________
dmarc-discuss mailing list
[email protected]
http://www.dmarc.org/mailman/listinfo/dmarc-discuss

NOTE: Participating in this list means you agree to the DMARC Note Well terms 
(http://www.dmarc.org/note_well.html)

Reply via email to